Hacker Newsnew | past | comments | ask | show | jobs | submit | syntheticcorp's commentslogin

I get your point but I think pentesters are perfectly capable of thinking in graphs, including web security. Bug chains are the immediate example, where a couple of CVSS 4-7 vulns can be turned into a full rce/whatever 9.8 equivalent. This bug chaining fundamentally occurs via elements of compromise i.e a graph traversal.

Bloodhound is great, and a nice visual tool for people to conceptualise attack graphs but it’s just a part of the process of understanding the target domain from an attackers perspective. No nice tool like bloodhound exists for web pentesting because a chain of compromise can’t simply be reduced into tool form there because a chain is often specific to the app and not an underlying framework, unlike AD where the security boundaries are well(ish) understood and codified.

Pentest reports include stuff like SMB signing and “don’t admin everything with your DA account ” because they are glowing hot nodes very early in a chain of compromise, meaning that is often how stuff gets popped IRL. It’s (hopefully) not that the pentester doesn’t understand graph thinking, it’s just the the first node in the graph represents effectively complete compromise, so why traverse?


It’s pretty infrequent outside of target attacks. Most recent is probably the roundcube XSS CVE-2023-43770 that was actively exploited as 0day by a threat actor last year.


Specifically, Marriott was deauthing rather than just plain jamming.


Deauthing is an application-soecific jamming.

There's lots of types of jamming, not just white noise static.


Control over a clients DNS doesn’t let the VPN provider view the contents of TLS encrypted traffic. However they can view unencrypted data from connections like SNI headers, DNS queries etc.


The point here is that if you use someone else’s dns, they can redirect any domain to their server and sign the cert too since they also control the traffic.


You can’t serve a valid certificate chain to the client even if you control their traffic, because your malicious certificate isn’t signed by a trusted CA. And you can’t get a CA signature without demonstrating control of the domain to a CA.


It’s a vlc issue with h265 - I actually noticed this with videos from defcon last year. Pull the YouTube version or reencode to h264 to fix.


Yes it can do that now, at least on Windows 10


I’ve also encountered that a few times where a fairly anodyne bug in a codepath prevents a serious security bug from being reachable. With my attacker hat on it is very tempting to just report the first one…


The commenter you’re replying to is CTO of Cloudflare, so I’d say they likely know why the company makes these blog posts.



Browsers already include this feature in a coarse grained (but utterly sufficient) manner in the form of a scroll bar.


The scroll bar that some OSes hide and that cannot know if there's a massive picture or a map or 50 of them? Not nearly the same thing.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: